First published: Thu Jun 13 2024(Updated: )
This vulnerability allows remote attackers to bypass the Mark-of-the-Web protection mechanism on affected installations of Dropbox Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of shared folders. When syncing files from a shared folder belonging to an untrusted account, the Dropbox desktop application does not apply the Mark-of-the-Web to the local files. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current user.
Affected Software | Affected Version | How to fix |
---|---|---|
Dropbox Dropbox Desktop |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-23991 is categorized as a medium risk due to the potential for exploitation if user interaction occurs.
To fix ZDI-CAN-23991, ensure that you update your Dropbox Desktop to the latest version where the vulnerability has been addressed.
Users of Dropbox Desktop are affected by ZDI-CAN-23991, particularly those using versions prior to the update that resolves the issue.
ZDI-CAN-23991 allows remote attackers to bypass the Mark-of-the-Web protection mechanism on affected installations.
Yes, user interaction is required for ZDI-CAN-23991 as the target must visit a malicious page or open a malicious file.